-
41
A note on irreducible Heegaard diagrams
Published 2006-01-01“…The first example was given by Im and Kim but our diagram has smaller complexity. Furthermore the proof presented here is quite different to that of the quoted authors, and permits also to obtain a simple alternative proof of their result. …”
Get full text
Article -
42
Application of the Flux-Variance Technique for Evapotranspiration Estimates in Three Types of Agricultural Structures
Published 2018-01-01“…However, within the insect-proof screenhouse (below the screen) and the plastic-covered greenhouse, R2 of the energy balance closure was poor; hence, the alternative simple method could not be used. …”
Get full text
Article -
43
TIE‐GCM ROPE ‐ Dimensionality Reduction: Part I
Published 2025-01-01“…However, the computational complexity of such models have primarily kept them being used operationally. …”
Get full text
Article -
44
Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis
Published 2017-01-01“…Analysis shows that the complexity of our scheme is lower than that of the exhaustive attack.…”
Get full text
Article -
45
Global solutions to the Cauchy problem of BNSP equations in some classes of large data
Published 2024-09-01“…It made the whole proof more simple and clear, meanwhile, resulted in the large time decaying estimates of the solution. …”
Get full text
Article -
46
The Principle of Mathematical Induction: Applications in Physical Optics
Published 2022-01-01“…The bare rudiments of the principle of mathematical induction as a method of proof date back to ancient times. In the contemporary university milieu, the demonstrative scheme is taught as part of a course in discrete mathematics, set theory, number theory, graph theory, group theory, game theory, linear algebra, logic, and combinatorics. …”
Get full text
Article -
47
Functional switching among dynamic neuronal hub-nodes in the brain induces maintenance/transition of cognitive states
Published 2025-01-01“…The multifractal spectrum width categorized VST as highly non-linear and more complex than vigilance states. The NREMS possesses a more complex cortical structure but it exhibits lower functional complexity than REMS and Wake. …”
Get full text
Article -
48
A Mechanically Proved and an Incremental Development of the Session Initiation Protocol INVITE Transaction
Published 2014-01-01“…The Event-B refinement concept allows an incremental development by defining the studied system at different levels of abstraction, and Rodin discharges almost all proof obligations at each level. This interaction between modeling and proving reduces the complexity and helps in assuring that the INVITE transaction SIP specification is correct, unambiguous, and easy to understand.…”
Get full text
Article -
49
A novel minimal exposure path problem in wireless sensor networks and its solution algorithm
Published 2016-08-01“…This article also provides a proof for the convergence of the designed algorithm. …”
Get full text
Article -
50
Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks
Published 2017-03-01“…However, the bilinear pairing operation is one of the most complex cryptographic operations and the assumption of tamper-proof device is very strong. …”
Get full text
Article -
51
Pipelined Training with Stale Weights in Deep Convolutional Neural Networks
Published 2021-01-01“…The growth in size and complexity of convolutional neural networks (CNNs) is forcing the partitioning of a network across multiple accelerators during training and pipelining of backpropagation computations over these accelerators. …”
Get full text
Article -
52
The differentiation state of small intestinal organoid models influences prediction of drug-induced toxicity
Published 2025-01-01“…Traditional in vitro models using transformed cell lines do not capture this cellular complexity, and often fail to predict intestinal toxicity. …”
Get full text
Article -
53
Methods of committing criminal offences related to raiding
Published 2024-06-01“…Given that the method embodies the objective side of a criminal offence, the complexity of its establishment and proof in the cognitive activity of an investigator, detective, coroner, therefore, in the context of cognition of raiding, it is subject to a thorough study. …”
Get full text
Article -
54
Development of algorithm for receiving and decoding input signal using MTD decoder for subscriber terminals operating with low-orbit spacecraft
Published 2021-03-01“…The relevance of the topic is determined by the need to increase the speed of data transmission in satellite telecommunication systems through the use of noise-proof coding. The speed of data transmission in a radio channel is actually determined by the level of interference present due to the fact that the radio transmission medium is a public environment and other electronic devices operate in it. …”
Get full text
Article -
55
On the Parametric Stokes Phenomenon for Solutions of Singularly Perturbed Linear Partial Differential Equations
Published 2012-01-01“…The proof rests on the construction of neighboring sectorial holomorphic solutions to the first mentioned equation whose differences have exponentially small bounds in the perturbation parameter (Stokes phenomenon) for which the classical Ramis-Sibuya theorem can be applied. …”
Get full text
Article -
56
Single-Round Patterned DNA Library Microarray Aptamer Lead Identification
Published 2015-01-01“…The DNA library was specifically designed to increase the probability of binding by enhancing structural complexity in a sequence-space confined environment, much like generating lead compounds in a combinatorial drug screening library. …”
Get full text
Article -
57
The Effects of Different Phase on Independent Visual Fields SSVEP Responses
Published 2025-01-01“…Binocular disparate stimulation based on steady-state visual evoked potentials (SSVEP) generates more recognizable features but also introduces complexity hardening the interpretability of SSVEP responses. …”
Get full text
Article -
58
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
Published 2014-01-01“…This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. …”
Get full text
Article -
59
Three-Dimensional Digital Documentation for the Conservation of the Prambanan Temple Cluster Using Guided Multi-Sensor Techniques
Published 2025-01-01“…Therefore, we can conclude that our approach is promising for complex heritage documentation. These results provide a solid foundation for future analyses, particularly in assessing structural vulnerabilities and informing conservation strategies.…”
Get full text
Article -
60
On numerically effective log canonical divisors
Published 2002-01-01“…Let (X,Δ) be a 4-dimensional log variety which is proper over the field of complex numbers and with only divisorial log terminal singularities. …”
Get full text
Article